This non-provisional patent application claims priority to Great Britain applications: GB 1412719.5, filed Jul. 17, 2014; GB 1405790.5, filed Mar. 31, 2014; GB 1403314.6, filed Feb. 25, 2014; GB 1405785.5, filed Mar. 31, 2014; GB 1405786.3, filed Mar. 31, 2014; GB 1405789.7, filed Mar. 31, 2014; GB 1403312.0, filed Feb. 25, 2014; GB 1405791.3, filed Mar. 31, 2014; GB 1405797.0, filed Mar. 31, 2014.
This invention relates to a system and method for updating data at a node in a mesh network.
Wireless mesh networks are an example of an ad hoc network in which each device can relay data on behalf of other devices in the network. A pair of devices in a mesh network might not be able to communicate directly with one another. Instead, communications between the pair of devices can be supported by one or more other devices in the mesh network which act to relay data from one device of the pair to the other. In such mesh networks, a connection between a given pair of devices can be intermittent and short-lived due to intermediate devices supporting the connection moving in and out of the signal range of adjacent devices, interference, and those intermediate devices entering low power states.
These issues are compounded when the device wishing to communicate over the wireless mesh network is itself subject to power restrictions. Such devices, which can include ultra-low power devices intended to run for many years on a single battery, may themselves spend a significant proportion of time in a low power state in which communication is not possible or in which the device is configured to respond only to certain network packets (e.g. those for which it is the endpoint). Low power devices may only achieve sporadic connectivity to resources in the network, which can make it difficult for those devices to perform functions that are typically enabled by network connectivity, such as downloading software updates and performing data backups to a remote location.
Enabling devices to update their software can allow the function set of a device to be changed without requiring that the physical device is replaced. For example, a software update can provide new functionalities and bug fixes to a device. This can be advantageous even for the most low-power devices.
Devices in mesh networks often present difficulties to the usual approaches for performing software updates. For example, nodes in mesh networks can suffer from unreliable connections and are limited by the small size of data packets typically transported over the network. These difficulties generally include the problems discussed above for low power devices suffering from intermittent connectivity to a mesh network. Software updates can be a particular problem when the mesh network represents an “Internet of Things” because devices on such mesh networks can be inaccessible to a user (such as a light controller embedded in a wall) and may often not present any kind of interface accessible to the user (preventing actions such as a physical reset).
There is a need for a robust update mechanism for devices operating in mesh networks which allows very low power devices with potentially intermittent access to the network to be reliably updated.
According to a first aspect of the present invention there is provided a method for providing an update package to a node in a mesh network comprising a set of nodes and a gateway node arranged to provide access to an update server by means of a second network, the method comprising: the gateway node collecting data package information from each of the set of nodes including a first node, each data package information instance identifying a respective node and its data package version; using the data package information, the gateway node querying the update server by means of the second network so as to cause the update server to respond to the gateway node with an updated data package for at least the first node; the gateway node broadcasting the updated data package into the mesh network as a sequence of first mesh messages carrying an identifier of the first node; and on receiving a first mesh message: each of a first plurality of nodes of the set, including the first node, scheduling one or more operations to forward the first mesh message to other nodes of the set; and the first node additionally storing the first mesh message so as to, as the sequence of first mesh messages is received, assemble the updated data package.
The gateway node may broadcast each of the sequence of first mesh messages into the mesh network more than once.
The gateway node may periodically broadcast each the sequence of first mesh messages into the mesh network for a predetermined period of time.
The gateway node may collect data package information from the first node by broadcasting an information request into the mesh network and in response receiving the data package information from the first node.
The gateway node may collect data package information from the first node by receiving the data package information as an unsolicited broadcast by the first node into the mesh network.
The data package information may indicate the type of each node in the set and, on collecting the data package information, the gateway node may: identifying a plurality of nodes of the set of the same type; defining a first group identifier for that plurality of nodes; and broadcasting the first group identifier into the mesh network such that each of the plurality of nodes becomes associated with the first group identifier.
The plurality of nodes may include the first node and the sequence of first mesh messages may represent the updated data package each including the first group identifier as the identifier of the first node.
The method may further comprise a second plurality of nodes of the set caching mesh messages and, on the first node identifying a missing message in the sequence of first mesh messages it has received, the first node may broadcast a missing message request into the mesh network so as to cause one of the second plurality of nodes of the set to respond with a cached copy of the missing message.
Each first mesh message may include a first parameter representing a first time period for which that first mesh message is to persist in the mesh network, and each of the second plurality of nodes may discard a first mesh message from it cache once the first time period is determined to have elapsed for that message.
The first parameter may indicate one or more of: a time when the respective message expires; a period of time as measured from a timestamp of the respective message; a remaining period of time for which the respective message is to persist from its time of reception at a node.
The first node may, on receiving a first mesh message, not transmit to the gateway node a message acknowledging receipt of the mesh message.
The set of nodes of the mesh network may authenticate received mesh messages using a security key common to the nodes of the mesh network.
The method may further comprise, on completing assembly of the updated data package, the first node entering an update mode and applying the updated data package.
Prior to entering its update mode, the first node may verify the updated data package using a checksum received with the updated data package.
The gateway node may broadcast the sequence of first mesh messages into the mesh network at a rate calculated in dependence on: an amount of storage available in the mesh network for caching mesh messages; and a first time period for which each first mesh message is to persist in the network.
The updated data package may comprise one or more of firmware for the first node, configuration information for the first node, operating parameters for the first node, a dataset for use at the first node, and code for execution at the first node.
According to a second aspect of the present invention there is provided a system for providing an update package to a node in a mesh network, the system comprising: a set of nodes of the mesh network, the set including a first node and a gateway node; the gateway node being operable to communicate over a second network and to collect data package information from each of the set of nodes, each data package information instance identifying a respective node and its data package version; and an update server accessible over the second network; the gateway node being configured to: using the data package information, query the update server by means of the second network so as to cause the update server to respond to the gateway node with an updated data package for at least the first node; and broadcast the updated data package into the mesh network as a sequence of first mesh messages carrying an identifier of the first node; and on receiving a first mesh message: each of a first plurality of nodes of the set, including the first node, scheduling one or more operations to forward the first mesh message to other nodes of the set; and the first node additionally storing the first mesh message so as to, as the sequence of first mesh messages is received, assemble the updated data package.
The present invention will now be described by way of example with reference to the accompanying drawings. In the drawings:
The following description is presented by way of example to enable any person skilled in the art to make and use the invention. The present invention is not limited to the embodiments described herein and various modifications to the disclosed embodiments will be readily apparent to those skilled in the art.
There is provided a system for updating data at a node in a mesh network, such as the firmware of the node, its application-ware or its configuration. The system is described herein by way of example with reference to the Bluetooth Smart mesh network in which nodes are referred to as “Things”. The second network could be any kind of network, including a wired or wireless network. In the examples described herein the second network provides access to the internet. The gateway or “hub” could be any suitable device operable to span the two networks, including a personal computer running appropriate software, an internet router, a smartphone or tablet, or any kind of network-enabled appliance such as a television, refrigerator or washing machine.
In
Gateway device 102 may be any of a variety of different types of devices (e.g, it may be a dedicated gateway device for a mesh network and not provide any further functionality). Typically, however, gateway device 102 may not be subject to severe power restrictions—for example, it could be mains-powered (such as an internet router or refrigerator), or it might be a portable device such as a smartphone, tablet or laptop which is frequently recharged by the user. At least some of the nodes could be ultra-low power devices. For example, node 115 could be a battery-powered dustbin sensor arranged to run on the same battery for many years and configured to transmit an indication to a local council indicating when the bin is full and needs emptying. The dustbin sensor would transmit its “bin full” indication into the mesh network for communication to the gateway 102 which provides access to the internet 108 for the mesh network. In this case, node 107 is in the range of BLE transmissions of the dustbin and would first receive the mesh message carrying the “bin full” indication. Node 107 would then propagate that message onto gateway 102. Since the “bin full” indication would be directed to a local council server accessible over internet 108, the gateway device 102 would forward the indication over link 109 to the internet.
Other Things on the mesh network 101 might have different power restrictions—for example they could be solar powered, or only receive power when the device is used (e.g. an occasionally-used kitchen appliance).
System 100 further comprises an update server 110 which is arranged to provide update packages for nodes of the mesh network. The update server could provide a “cloud service” so as to allow a node to receive updates by means of the internet 108. More generally, the update server could be accessible over any kind of network to which the gateway device has access, including a home or business network to which update server 110 is connected. An update package available at server 110 for a node could be firmware for the node, the firmware potentially being, for example, a new firmware version, replacement firmware for a current version, or an old firmware version (e.g. where rollback of node firmware is required).
Firmware can be any kind of code for execution at the node including, for example, application-ware (e.g. custom application code for execution at the node in an execution context provided by lower-level firmware) and low-level firmware (e.g. a kernel providing basic node functionality, such as radio communications and defining a software environment in which application-ware can be executed). An update package could alternatively or additionally include configuration information for the node (e.g. a saved configuration for a light switch thing), operating parameters for the node (e.g. calibration parameters for a thermostat thing), a dataset for use at the node (e.g. an encrypted list of allowed entry codes for a door entry pad), and code for execution at the node (e.g. an application for execution at a refrigerator to provide a diary information on its display screen).
A first example will now be described with reference to
Lightbulb 106 operates according to firmware stored at the thing and adapted for execution at a processor 210 (typically a low power system-on-chip processor). The firmware defines various functions associated with the operation of the lightbulb (e.g. routines for turning on and off the light, controlling its colour temperature etc.) and the operation of the Thing as a node within BLE mesh network 101 (e.g. routines defining BLE messaging protocols, performing firmware updates). In this example, the firmware is provided in two parts: low level firmware 203 which defines a software environment, and higher-level application-ware (or “appware”) 201 for running in that software environment. In the present example it is the appware which is updated, but more generally it could be any aspect of the firmware or data held at Thing 106. The appware includes routines for controlling the operation of the lightbulb, such as routines for turning on and off its light source according to a defined schedule, and routines for controlling the colour temperature of the lightbulb. Lightbulb thing 106 is provided with a Bluetooth radio 212 by means of which the thing communicates over mesh network.
Gateway device 102 is in this example a laptop comprising a memory 206 and a CPU 211. Laptop 102 supports an update agent 207 which is software configured to perform aspects of the update mechanism described herein so as to update the appware at Thing 106. Laptop 102 comprises a Bluetooth radio 213 by means of which it communicates over BLE mesh network 101, and a WiFi radio 214 by means of which it communicates over the internet 108. The gateway device functionality, including update agent 207 and the necessary routines to cause the laptop to behave as a gateway device in mesh network 101, can be provided at the laptop as software running at the CPU 211.
Update server 110 is in this example a cloud server accessible over the internet 108 and comprising a processor 215, memory 216 and a network interface 217 adapted to couple the server to the internet. Server 110 includes an update manager 218 for supporting communications with update agent 207 at mesh network 101. The update manager would typically be software running at processor 215. Two data stores are supported at or accessible to the server: a device registry 208 and a package repository 209. In other examples, the server could support one or more data stores collectively storing data packages and information identifying the devices or device types to which each data package relates.
Device registry 208 comprises identifiers for the things at mesh network 101, with each identifier being a unique string and/or key set at the thing during manufacture (in practice, each identifier may be an identifier of the BLE chip provided at a thing so as to permit that thing to operate in a mesh network, and the identifier may be set during manufacture of the BLE chip). The identifier could be a Bluetooth UUID and public key. Package repository 209 comprises firmware packages for one or more things in the mesh network, along with data indicating the target hardware for each firmware package (e.g. an identifier of the chip type to which the firmware relates). The package repository could be kept up to date by the manufacturers of the things such that new firmware can be made available at the repository when it is released by the manufacturer. The device registry can be maintained by the entity generating the unique identifiers for the things, e.g. the manufacturer of the BLE chip might post new identifiers and/or keys into the registry as new chips are manufactured and identifiers allocated to them.
It is to be understood that the representations of the thing, gateway device and server in
Laptop 102 is unlikely to be permanently powered and running in the home in which mesh network 101 is provided. Furthermore, the software at laptop 102 for providing the gateway functionality may not always be running when the laptop is powered—for example, the software may only run periodically as a service, or may only run when the user chooses to load the software and access the mesh network (e.g. to configure a schedule for turning a light source at lightbulb 106 on and off). This may mean the mesh network is provided with only sporadic access to the internet by means of the gateway device. There could be more than one gateway operating in the local network (e.g. more laptop 102 and a smartphone running appropriate software).
At least some of the nodes in the mesh network may be able to (though may not always be configured to) forward messages that are directed to other node(s) in the mesh through the scheduling of mesh messages broadcasts. Such forward operations could be scheduled periodically (e.g. to cause the node to periodically re-broadcast a mesh message) or at particular times when other nodes are known to be listening. The scheduling of a mesh message forwarding operation need not be for a particular future time; it could instead be in response to a condition of the mesh network being satisfied, e.g. a node becoming available on the network (a node could indicate its availability by broadcasting a suitable mesh message), or in response to a message being received from another node. This allows messages to reach nodes which, when those messages started out, were not at that instant accessible over the mesh network. In other words, messages can permeate through the mesh network even when a complete data path is not available at that instant from message source to endpoint, with the messages passing between nodes as and when communication becomes possible between those nodes. Broadcast messages can carry expiry information such that those messages are passed about the mesh network for some defined period of time, but after that period of time are discarded. In this manner, messages can persist for sufficient time in the mesh for the intended endpoint of a message to receive it. Security can be enforced in the mesh through the use of a common security key: in order to join the mesh network each node can be provided with the security key. The key could be used to encrypt/decrypt mesh messages.
This will now be illustrated by way of example with respect to
It will be appreciated that as a result of changes in connectivity within the mesh network, lightbulb 106 may only be able to sporadically access the gateway device and hence internet 108. Such accesses may be short-lived and, to cope with potentially severe energy restrictions at the lightbulb, may be performed at very low power. It is however desirable for even low power things in a mesh network to be able to automatically receive firmware updates. This allows those things to be provided with new or updated functionalities and bugs to be fixed without requiring that the hardware itself is replaced. A low power, opportunistic mechanism is required by which things such as lightbulb 106 can update their firmware or other data.
In alternative examples, lightbulb 106 is configured to from time to time broadcast a mesh message carrying its identity and appware version into the mesh network without being solicited by gateway 102.
As a gateway device, node 102 collects the responses from the nodes in the mesh, including response 251 from lightbulb 106. Armed with the appware version of thing 106 and its identity, update agent 207 of gateway 102 can then proceed to query update server 110 by means of the internet and it's WiFi radio 214. This query can be performed at any convenient point, e.g. the next time gateway device 102 achieves a connection to the internet, or when a user of the gateway device chooses to check for updates for things at the mesh network. Update agent 207 queries the update manager 218 operating at the update server by transmitting query message 252 which carries information identifying thing 106 and its appware version.
On receiving the query 252, the update manager consults device registry 208 using the information identifying thing 106 (e.g. its model number) and its current appware version in order to identify whether updated appware is available for the lightbulb. In this case updated appware v1.3 is available for the lightbulb and is retrieved from package repository 209 and transmitted in data packet(s) 253 by the update manager 218 to gateway 102. The update package could be encoded so as to ensure the update is used only by the intended thing 106—for example, the update package could be encrypted using a public key of thing 106 known to the device registry. Gateway device 102 stores the firmware package at its memory 206. The update package could also be signed by the update server with the private key of an asymmetric keyset associated with the server. The public key of the server can be provided to the mesh network and hence known to the mesh node and/or the gateway so that the source of the update package can be verified at the gateway before it is broadcast into the mesh and/or by the node before the update is applied. This can avoid the injection of rogue updates into the mesh.
By arranging that the gateway discovers the firmware on behalf of the thing and then downloads (and potentially verifies the signature of) that firmware, the gateway can perform these energy-intensive operations which require a reliable connection to the update server. Given the small message size typically used in mesh network 101, in order to pass the downloaded firmware to the thing, the gateway performs segmentation of the update package into a sequence of mesh messages. These messages are broadcast into the mesh according to the mesh network protocols such that the lightbulb can build up (potentially over some time) the update package from the data segments. One or more of the mesh messages may include a checksum or other means for verifying the integrity of the received update package.
If updated firmware is not available, the update manager indicates this to the gateway device. Preferably the update agent at the gateway device does not transmit this information into the mesh network 101 so as to avoid causing the mesh nodes to expend unnecessary energy receiving and parsing that information.
Update packages received at the gateway are stored at the gateway's package cache 205 so as to allow subsequent dissemination of the update package data without requiring the gateway to maintain a connection to the update server. Once the gateway holds the update package for lightbulb 106, it can begin to communicate the update package to the lightbulb by broadcasting the update package as a sequence of mesh messages 254 into the mesh network 101. Due to the small size of mesh messages, typically an update package may be segmented by the gateway into many small mesh messages, each carrying a portion of the update package in their payload data. This segmentation could be performed at the gateway or at the server. If it is performed at the server, the gateway could be configured to push into the mesh (possibly with minor protocol processing, such as inserting sequence numbers into the messages) mesh messages carried in the payload of data packets received from the server (e.g. TCP/IP or UDP data packets).
Each mesh message of the sequence includes an identifier of lightbulb 106. This could be an identifier specific to the lightbulb, such as its Bluetooth ID, or a group identifier for a group to which the lightbulb belongs. The identifier need not be used to route the mesh message since the mesh network may employ very limited message routing, but the identifier does allow the lightbulb to identify when it receives a mesh message which is directed to it.
It is advantageous if the node(s) to which an update mesh message is intended additionally forward the message onto other nodes of the mesh network. This helps ensure that the sequence of mesh messages reach all parts of the mesh network and allows the same mesh messages to be used to update multiple nodes of the mesh network.
The gateway can be configured to define groups of nodes on collecting responses 251 from the nodes of the mesh network which carry the identity and version information of the nodes. On identifying more than one node being of the same type and having the same package version (e.g. the same appware version), the gateway could define a group for those nodes and cause those nodes to be associated with the group. The gateway could, for example, broadcast a mesh message into the mesh indicating to those nodes that they belong to the group and should therefore be responsive to mesh messages directed to that group. For example, nodes 104, 105 and 106 could all be lightbulbs of the same model and having the same appware version, with gateway 102 defining a group “lightbulb_1”. Since in many cases all of the lightbulbs would receive the same update package, allowing the gateway to address an update package to all of the bulbs of the group minimises the amount of data injected into the mesh network and hence the amount of work nodes of the network (which may be very low power devices) do in relaying update messages around the network to their intended destination.
As indicated by arrow 255 in
The gateway could be configured to transmit the sequence of mesh messages carrying an update package at a rate which depends on the total memory available at the nodes of the mesh network for caching mesh messages. This can help the gateway to avoid flooding the mesh network which push earlier messages out of the caches at the nodes before those messages have reached their intended destination. For example, the gateway could be configured to receive in messages 251 information about the memory available for caching mesh messages (since not all of the nodes necessarily choose to cache messages, the memory available might be less than the total memory capacity of the mesh network). Based on an expectation as to how long messages take to find their intended destination, the gateway could then determine the rate at which the sequence of messages should be pushed into the mesh network and/or the period according to which the broadcast of messages of the sequence should be repeated.
The sequence of mesh messages may travel via multiple nodes of the mesh network and on a variety of paths in order to reach lightbulb 106 from the gateway. This is indicated by the set of nodes 280 in
On receiving a mesh message directed to it (as determined from the identifier carried in each message), the lightbulb 106 may store that portion of the update package carried in the message for assembly into the complete update package. In the example shown in
The mesh messages could comprise header information or other data identifying each mesh message of the sequence as being a mesh message carrying an update package.
This allows the lightbulb to distinguish received mesh messages that carry a portion of the update package from mesh message carrying other data.
Once the lightbulb has received all of the messages of the sequence and the complete data package is available, the lightbulb preferably verifies the integrity and, optionally, the signature of the downloaded data package. For example, the lightbulb could perform a checksum over the received data of the data package and compare that checksum to a checksum provided with the mesh messages. If the updated data package is successfully verified, the lightbulb enters its update mode, applies the updated appware and reboots.
On verifying the updated package, the lightbulb could broadcast an acknowledgement onto the mesh network directed to the gateway so as to inform the gateway that the update package has been successfully received; the gateway could then delete the package from its memory (or if the lightbulb belongs to a group, when the gateway has received an acknowledgement from all of the nodes of the group). In some embodiments, however, the lightbulb may not broadcast acknowledgements of successfully received messages or of the complete data package.
A node being updated (in this case lightbulb 106) may be configured to broadcast a missing message request when it determines that a message is missing from the sequence. For example, the missing message request could be triggered when the lightbulb receives a subsequent mesh message in the update sequence when it has not yet received an earlier mesh message in the sequence. It will be appreciated that many other trigger configurations are possible. The missing message request is broadcast into the mesh so as to cause any other node which has cached a copy of the missing message to transmit the missing message to the lightbulb. The missing message request is not directed to the gateway, although the gateway could potentially receive the request and respond with a copy of the missing message. This mechanism allows the collective memory of nodes in the mesh to fill any holes in the update package assembled by the lightbulb.
Since the lightbulb might belong to a group such that there are other nodes receiving the same update package, it can be advantageous for the lightbulb to both store the payload of each received mesh message in memory area 204 in which it is assembling the update package as well as caching a copy of the original mesh message such that it can respond to missing message requests received from other nodes of the group.
The broadcasting of messages in mesh networks should not be understood to require that messages are explicitly addressed to all nodes of the network; broadcasting messages in a mesh network makes those messages available to any node of the mesh which is listening so as to allow those messages to potentially reach all nodes of the network.
The thing, gateway, and server/database of
The terms software and program code as used herein includes executable code for processors (e.g. CPUs and/or GPUs), firmware, bytecode, programming language code such as C, and modules for reconfigurable logic devices such as FPGAs.
The algorithms and methods described herein could be performed by one or more physical processing units executing software that causes the unit(s) to perform the algorithms/methods. Each physical processing unit could be any suitable processor, such as a CPU or GPU (or a core thereof), or fixed function or programmable hardware. The software could be stored in non-transitory form at a machine readable medium such as an integrated circuit memory, or optical or magnetic storage. A machine readable medium might comprise several memories, such as on-chip memories, computer working memories, and non-volatile storage devices.
The applicant hereby discloses in isolation each individual feature described herein and any combination of two or more such features, to the extent that such features or combinations are capable of being carried out based on the present specification as a whole in the light of the common general knowledge of a person skilled in the art, irrespective of whether such features or combinations of features solve any problems disclosed herein, and without limitation to the scope of the claims. The applicant indicates that aspects of the present invention may consist of any such individual feature or combination of features. In view of the foregoing description it will be evident to a person skilled in the art that various modifications may be made within the scope of the invention.
Number | Date | Country | Kind |
---|---|---|---|
1403312.0 | Feb 2014 | GB | national |
1403314.6 | Feb 2014 | GB | national |
1405785.5 | Mar 2014 | GB | national |
1405786.3 | Mar 2014 | GB | national |
1405789.7 | Mar 2014 | GB | national |
1405790.5 | Mar 2014 | GB | national |
1405791.3 | Mar 2014 | GB | national |
1405797.0 | Mar 2014 | GB | national |
1412719.5 | Jul 2014 | GB | national |
Number | Name | Date | Kind |
---|---|---|---|
6917974 | Stytz et al. | Jul 2005 | B1 |
6986046 | Tuvell et al. | Jan 2006 | B1 |
7522540 | Maufer | Apr 2009 | B1 |
7778270 | Zhang et al. | Aug 2010 | B1 |
7787427 | Simon et al. | Aug 2010 | B1 |
8495618 | Inbaraj et al. | Jul 2013 | B1 |
8516269 | Hamlet et al. | Aug 2013 | B1 |
8681671 | Hui et al. | Mar 2014 | B1 |
8938792 | Koeberl et al. | Jan 2015 | B2 |
8953790 | Qi et al. | Feb 2015 | B2 |
20020119770 | Twitchell | Aug 2002 | A1 |
20030037237 | Baldwin et al. | Feb 2003 | A1 |
20030163554 | Sendrowicz | Aug 2003 | A1 |
20030181203 | Cheshire | Sep 2003 | A1 |
20050036469 | Wentink | Feb 2005 | A1 |
20050113102 | Kwon et al. | May 2005 | A1 |
20050175184 | Grover et al. | Aug 2005 | A1 |
20050246533 | Gentry | Nov 2005 | A1 |
20050249137 | Todd et al. | Nov 2005 | A1 |
20060025180 | Rajkotia et al. | Feb 2006 | A1 |
20060034233 | Strutt et al. | Feb 2006 | A1 |
20060041653 | Aaron | Feb 2006 | A1 |
20060135064 | Cho et al. | Jun 2006 | A1 |
20060154598 | Rudland et al. | Jul 2006 | A1 |
20060156390 | Baugher | Jul 2006 | A1 |
20060209584 | Devadas et al. | Sep 2006 | A1 |
20060212938 | Suzuki | Sep 2006 | A1 |
20060245424 | Ramanathan et al. | Nov 2006 | A1 |
20060268742 | Chu et al. | Nov 2006 | A1 |
20060268749 | Rahman et al. | Nov 2006 | A1 |
20070097895 | Keshavarzian et al. | May 2007 | A1 |
20070105542 | Friedman | May 2007 | A1 |
20070110024 | Meier | May 2007 | A1 |
20070127421 | D'Amico et al. | Jun 2007 | A1 |
20070206537 | Cam-Winget et al. | Sep 2007 | A1 |
20070211654 | Kim et al. | Sep 2007 | A1 |
20070211736 | Sapek et al. | Sep 2007 | A1 |
20070247303 | Payton | Oct 2007 | A1 |
20070280137 | Bahr et al. | Dec 2007 | A1 |
20080013947 | Peloso et al. | Jan 2008 | A1 |
20080095059 | Chu et al. | Apr 2008 | A1 |
20080205385 | Zeng et al. | Aug 2008 | A1 |
20080279155 | Pratt, Jr. et al. | Nov 2008 | A1 |
20080291855 | Bata et al. | Nov 2008 | A1 |
20080292105 | Wan et al. | Nov 2008 | A1 |
20090067373 | Kneckt et al. | Mar 2009 | A1 |
20090216349 | Kwon et al. | Aug 2009 | A1 |
20090222659 | Miyabayashi et al. | Sep 2009 | A1 |
20090232037 | Dixit et al. | Sep 2009 | A1 |
20090274173 | Wentink | Nov 2009 | A1 |
20100005294 | Kostiainen et al. | Jan 2010 | A1 |
20100046439 | Chen et al. | Feb 2010 | A1 |
20100100940 | Reynolds | Apr 2010 | A1 |
20100141406 | Jo et al. | Jun 2010 | A1 |
20100149028 | Mermet et al. | Jun 2010 | A1 |
20100191968 | Patil et al. | Jul 2010 | A1 |
20100202345 | Jing et al. | Aug 2010 | A1 |
20100205281 | Porter et al. | Aug 2010 | A1 |
20100241857 | Okude et al. | Sep 2010 | A1 |
20100246460 | Kholaif et al. | Sep 2010 | A1 |
20100260146 | Lu | Oct 2010 | A1 |
20100262828 | Brown et al. | Oct 2010 | A1 |
20110053493 | Yanagihara | Mar 2011 | A1 |
20110081860 | Brown et al. | Apr 2011 | A1 |
20110099368 | Koh | Apr 2011 | A1 |
20110121654 | Recker et al. | May 2011 | A1 |
20110128884 | Reynaud et al. | Jun 2011 | A1 |
20110216695 | Orth | Sep 2011 | A1 |
20120087290 | Rhee et al. | Apr 2012 | A1 |
20120087292 | Grimm et al. | Apr 2012 | A1 |
20120163292 | Kneckt et al. | Jun 2012 | A1 |
20120195231 | Fonseca et al. | Aug 2012 | A1 |
20120196534 | Kasslin et al. | Aug 2012 | A1 |
20120198434 | Dirstine et al. | Aug 2012 | A1 |
20120198435 | Dirstine | Aug 2012 | A1 |
20120252405 | Lortz et al. | Oct 2012 | A1 |
20120263072 | Wu | Oct 2012 | A1 |
20130016654 | Mayo et al. | Jan 2013 | A1 |
20130029685 | Moshfeghi | Jan 2013 | A1 |
20130051552 | Handschuh et al. | Feb 2013 | A1 |
20130064175 | Pandey et al. | Mar 2013 | A1 |
20130065584 | Lyon et al. | Mar 2013 | A1 |
20130067222 | Munger et al. | Mar 2013 | A1 |
20130070745 | Nixon et al. | Mar 2013 | A1 |
20130080765 | Mohanty et al. | Mar 2013 | A1 |
20130128809 | Wentink et al. | May 2013 | A1 |
20130130622 | Yang et al. | May 2013 | A1 |
20130198305 | Veillette | Aug 2013 | A1 |
20130215900 | Jogadhenu | Aug 2013 | A1 |
20130219482 | Brandt | Aug 2013 | A1 |
20130227336 | Agarwal et al. | Aug 2013 | A1 |
20130242929 | Gorgen | Sep 2013 | A1 |
20130279409 | Dublin, III et al. | Oct 2013 | A1 |
20130279410 | Dublin, III et al. | Oct 2013 | A1 |
20130301471 | Brown et al. | Nov 2013 | A1 |
20140025806 | Robitaille et al. | Jan 2014 | A1 |
20140044016 | Rahman | Feb 2014 | A1 |
20140047260 | Iijima | Feb 2014 | A1 |
20140064261 | Wang et al. | Mar 2014 | A1 |
20140089912 | Wang et al. | Mar 2014 | A1 |
20140108786 | Kreft | Apr 2014 | A1 |
20140111234 | Laackmann et al. | Apr 2014 | A1 |
20140112470 | Shen et al. | Apr 2014 | A1 |
20140167912 | Snyder et al. | Jun 2014 | A1 |
20140169174 | Gilson | Jun 2014 | A1 |
20140189790 | Mindler et al. | Jul 2014 | A1 |
20140266669 | Fadell et al. | Sep 2014 | A1 |
20140337607 | Peterson et al. | Nov 2014 | A1 |
20150010153 | Robertson | Jan 2015 | A1 |
20150052351 | Nodehi et al. | Feb 2015 | A1 |
20150058409 | Wang | Feb 2015 | A1 |
20150143130 | Ducharme et al. | May 2015 | A1 |
20150195692 | Chow et al. | Jul 2015 | A1 |
20150242614 | Scagnol et al. | Aug 2015 | A1 |
20150244481 | Tyson et al. | Aug 2015 | A1 |
20150244484 | Tyson et al. | Aug 2015 | A1 |
20150244565 | Heydon et al. | Aug 2015 | A1 |
20150244623 | Heydon et al. | Aug 2015 | A1 |
20150244648 | Tyson et al. | Aug 2015 | A1 |
20150244828 | Heydon | Aug 2015 | A1 |
20150245179 | Jarvis et al. | Aug 2015 | A1 |
20150245203 | Tyson et al. | Aug 2015 | A1 |
20150245204 | Heydon | Aug 2015 | A1 |
20150245220 | Williamson et al. | Aug 2015 | A1 |
20150245231 | Jarvis et al. | Aug 2015 | A1 |
20150245296 | Tyson et al. | Aug 2015 | A1 |
20150245351 | Banerjea et al. | Aug 2015 | A1 |
20150245369 | Heydon | Aug 2015 | A1 |
20150245412 | Tyson et al. | Aug 2015 | A1 |
20150326444 | Smith et al. | Nov 2015 | A1 |
Number | Date | Country |
---|---|---|
102761941 | Oct 2012 | CN |
102984798 | Mar 2013 | CN |
1496668 | Jan 2005 | EP |
1780951 | May 2007 | EP |
1886450 | Feb 2008 | EP |
2306692 | Apr 2011 | EP |
2464125 | Apr 2010 | GB |
2007124148 | May 2007 | JP |
02078272 | Oct 2002 | WO |
03026224 | Mar 2003 | WO |
2004004230 | Jan 2004 | WO |
WO-2004104850 | Dec 2004 | WO |
2007013914 | Feb 2007 | WO |
2008004102 | Jan 2008 | WO |
2008013878 | Jan 2008 | WO |
2009082151 | Jul 2009 | WO |
2009088887 | Jul 2009 | WO |
2010036885 | Apr 2010 | WO |
2010089737 | Aug 2010 | WO |
2011043755 | Apr 2011 | WO |
2012064178 | May 2012 | WO |
2013010427 | Jan 2013 | WO |
2013028404 | Feb 2013 | WO |
2013057666 | Apr 2013 | WO |
2014000163 | Jan 2014 | WO |
Entry |
---|
Search Report for DE Application 10 2014 012 258.1 mailed on Mar. 2, 2015 (12 pages). |
Search Report for DE Application 10 2014 012 518.1 mailed on Feb. 27, 2015 (14 pages). |
Search Report for DE Application 10 2014 012 615.3 mailed on Jan. 27, 2015 (6 pages). |
Search Report for GB Application 1405790.5 mailed on Oct. 14, 2014 (5 pages). |
Search Report for GB Application 1403312.0 mailed on Jun. 25, 2014 (3 pages). |
Search Report for GB Application 1405786.3 mailed on Jul. 17, 2014 (3 pages). |
Search Report for GB Application 1415178.1 mailed on Sep. 25, 2014 (5 pages). |
Search Report for GB Application 1405797.0 mailed on Sep. 2, 2014 (3 pages). |
Search Report for GB Application 1405789.7 mailed on Sep. 26, 2014 (4 pages). |
Search Report for GB Application 1405797.0 mailed on Jul. 17, 2014 (4 pages). |
Search Report for GB Application 1415177.3 mailed on Sep. 10, 2014 (4 pages). |
Search Report for DE Application 10 2014 012 257.3 mailed on Jan. 27, 2015 (7 pages). |
Search Report for DE Application 10 2014 012 616.1 mailed on Feb. 3, 2015 (6 pages). |
Search Report for GB Application 1412715.3 mailed on Jan. 8, 2015 (3 pages). |
Search Report for GB Application 1412722.9 mailed on Jan. 13, 2015 (6 pages). |
Search Report for GB Application 1501943.3 mailed on Mar. 20, 2015 (4 pages). |
Schutz K: “Trusted Platforms for Homeland Security”, Atmel white paper, Copyright 2004, pp. 1-8, http://www.atmel.com/images/doc5062.pdf. |
Chiang et al., “Neighborhood-Aware Density Control in Wireless Sensor Networks,” 2008 IEEE International Conferences on Sensor Networks, Ubiquitous, and Trustworthy Computing, 8 pages. |
Balachandran et al., “Adaptice Sleeping and Awakening Protocol (ASAP) for Energy Efficient Adhoc Sensor Networks,” 2005 IEEE, 7 pages. |
Number | Date | Country | |
---|---|---|---|
20150245182 A1 | Aug 2015 | US |